Transport Layer Security (TLS)

16th February 2020 | Cybrary Transport Layer Security (TLS)


Transport Layer Security (TLS) is a security protocol made for privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between web applications and servers, such as web browsers loading a website.  TLS can also be used to encrypt other communications such as email, messaging, and voice over IP (VOIP). If you are to look at the URLs of most websites, they feature the security protocol HTTPS, for example, https://cyberhoot.com/. Wherever there is HTTPS used, it is employing TLS encryption.

TLS v1.2 is Flawed, You should be Using TLS v1.3

In recent years, TLS 1.2 flaws have been identified which necessitated a migration to TLS version 1.3 which is more secure, efficient, and the gold standard for online encrypted communications.  If you’re not using TLS 1.3 yet, you should be. Watch the advanced video below to know why.

Source: CloudFlare

Related Terms: Encryption

What does this mean for an SMB?

Whenever your employees are on the Internet, they should always be aware of the URL and ensuring that HTTPS is employed for a secure connection.  

To learn more about Transport Layer Security, watch these short videos:

The Basics: TLS, SSL, and Handshakes

Advanced: How TLS 1.3 works better!

https://www.youtube.com/embed/AlE5X1NlHgg

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more
The AI Threat Awakens: What OpenAI’s Latest Report Reveals About Cybercrime

The AI Threat Awakens: What OpenAI’s Latest Report Reveals About Cybercrime

The rapid rise of generative AI has unlocked enormous promise, but it’s also accelerating the arms race in...

Read more